ClickFix in action: how fake captcha can encrypt an entire company
The ClickFix malware campaign targets organizations using fake CAPTCHA prompts to trick users into executing malicious code via Windows+R shortcuts. It involves two malware families, Latrodectus (v2. 3) and Supper, which establish persistence, communicate with C2 servers, and potentially encrypt company data. The attack leverages social engineering and side-loading techniques to evade detection and maintain long-term access. Indicators of compromise include specific C2 IP addresses and file hashes. Employee awareness and active monitoring for anomalous behaviors are critical to defense. The threat is medium severity but can cause significant disruption if successful. No known public exploits exist yet, but the complexity and stealth of the malware families pose a substantial risk. Organizations should focus on endpoint security, application control, and network monitoring to mitigate this threat. The most affected regions are likely those with significant Polish business presence and similar enterprise environments.
AI Analysis
Technical Summary
This threat involves a malware campaign targeting a large Polish organization using a social engineering technique involving fake CAPTCHA prompts. Users are deceived into running malicious code through the Windows+R shortcut, which is an uncommon but effective infection vector. The malware campaign includes two main families: Latrodectus version 2.3 and Supper. Latrodectus is known for its sophisticated persistence mechanisms, including side-loading legitimate DLLs to evade detection, and uses advanced techniques such as process injection (T1055) and credential dumping (T1003). Supper complements Latrodectus by providing additional capabilities such as ransomware-like encryption of company data. Both malware families communicate with command and control (C2) servers using encrypted protocols (T1071.001) to receive commands and exfiltrate data. The campaign employs obfuscation (T1027) and masquerading (T1036.004) to avoid signature-based detection. Persistence is maintained through scheduled tasks (T1053.005) and registry modifications. The report includes technical indicators like C2 IP addresses and file hashes, which can be used for detection and response. The attack chain demonstrates a blend of social engineering, malware sophistication, and stealthy communication, making it a complex threat to detect and mitigate. The absence of known public exploits suggests this is a targeted campaign rather than widespread opportunistic malware. The report emphasizes the importance of employee training to recognize social engineering attempts and the need for continuous monitoring of unusual system and network activities to detect early signs of compromise.
Potential Impact
If successful, this malware campaign can lead to significant operational disruption through encryption of critical company data, effectively amounting to a ransomware attack. The compromise of credentials and persistent access allows attackers to move laterally within the network, increasing the risk of data exfiltration and further sabotage. Organizations may face downtime, loss of sensitive information, reputational damage, and financial costs related to incident response and recovery. The use of sophisticated evasion techniques complicates detection and remediation, potentially prolonging the attack lifecycle. Given the targeted nature and the use of social engineering, organizations with large user bases and complex IT environments are particularly at risk. The impact extends beyond confidentiality to integrity and availability of systems and data, making this a multi-dimensional threat. Failure to detect early signs may result in widespread encryption and operational paralysis. The medium severity rating reflects the balance between the attack complexity and the need for user interaction, but the potential consequences warrant serious attention.
Mitigation Recommendations
To mitigate this threat, organizations should implement a multi-layered defense strategy. First, conduct targeted employee training focused on recognizing social engineering tactics, especially fake CAPTCHA prompts and suspicious use of Windows+R commands. Deploy application whitelisting and restrict execution of unauthorized scripts or binaries launched via shortcut keys. Enhance endpoint detection and response (EDR) capabilities to identify behaviors such as side-loading, process injection, and unusual scheduled tasks. Network monitoring should include anomaly detection for encrypted C2 communications and unusual outbound connections to known malicious IP addresses. Regularly update and patch systems to reduce the attack surface, even though no specific patches are noted for this malware. Implement strict credential management policies and monitor for signs of credential dumping. Use threat intelligence feeds to incorporate the provided indicators of compromise into security tools for proactive detection. Conduct regular backups with offline storage to enable recovery from ransomware-like encryption. Finally, establish incident response plans that include rapid isolation and forensic analysis to contain infections early.
Affected Countries
Poland, Germany, United Kingdom, United States, France, Netherlands, Czech Republic, Sweden, Austria, Belgium
Indicators of Compromise
- hash: 16afa928cd820a572bd47e798f481c46
- hash: e6133838440afc64ce9722343a1cb297
- hash: ee901ff4ad552d0f8dc8fd5837ace5ab
- hash: fd817202314d4067c2dc9c51d98f0268
- hash: 273962821f14982ead6c10823587fd39e89cf2fc
- hash: 699cf845d7320c0a7c1407dbf8f73c9fdfb5c754
- hash: b5710067c36447759b82593200f7374760d71571
- hash: d1eccb3d907f0cd7e52d502b340624d5dc98f8dc
- hash: 21b953dc06933a69bcb2e0ea2839b47288fc8f577e183c95a13fc3905061b4e6
- hash: 2528df60e55f210a6396dd7740d76afe30d5e9e8684a5b8a02a63bdcb5041bfc
- hash: 6673794376681c48ce4981b42e9293eee010d60ef6b100a3866c0abd571ea648
- hash: af45a728552ccfdcd9435c40ace60a9354d7c1b52abf507a2f1cb371dada4fde
- hash: b7f8750851e70ec755343d322d7d81ea0fc1b12d4a1ab6a60e7c8605df4cd6a5
- hash: be5bcdfc0dbe204001b071e8270bd6856ce6841c43338d8db914e045147b0e77
- ip: 110.199.19.162
- ip: 171.130.169.141
- ip: 185.233.166.27
- ip: 27.166.233.185
- ip: 85.239.54.130
- url: http://jzluw.com/cdn-dynmedia-1.microsoft.com/is/n03ufh3k003jdhkg99fhhas/is/content/
- url: http://naintn.com/amazoncdn.com/oeiich37874cj30dkk43885j10vj38h38jd/nrs/opn/ca/
- url: https://fadoklismokley.com/work/
- url: https://fadoklismokley.com/work/?counter=0&type=1&guid=3B7FFFF7F331576B6FA3479BDF43&os=6&arch=1&username=JohnDoe&group=2201209746&ver=2.3&up=7&direction=fadoklismokley.com
- url: https://gasrobariokley.com/work/
- url: https://gasrobariokley.com/work/?counter=0&type=1&guid=3B7FFFF7F331576B6FA3479BDF43&os=6&arch=1&username=JohnDoe&group=2201209746&ver=2.3&up=7&direction=gasrobariokley.com
- hash: 3d56542349180e144aa17230e99b7eb4a29b97ea
- domain: fadoklismokley.com
- domain: gasrobariokley.com
- domain: jzluw.com
- domain: naintn.com
ClickFix in action: how fake captcha can encrypt an entire company
Description
The ClickFix malware campaign targets organizations using fake CAPTCHA prompts to trick users into executing malicious code via Windows+R shortcuts. It involves two malware families, Latrodectus (v2. 3) and Supper, which establish persistence, communicate with C2 servers, and potentially encrypt company data. The attack leverages social engineering and side-loading techniques to evade detection and maintain long-term access. Indicators of compromise include specific C2 IP addresses and file hashes. Employee awareness and active monitoring for anomalous behaviors are critical to defense. The threat is medium severity but can cause significant disruption if successful. No known public exploits exist yet, but the complexity and stealth of the malware families pose a substantial risk. Organizations should focus on endpoint security, application control, and network monitoring to mitigate this threat. The most affected regions are likely those with significant Polish business presence and similar enterprise environments.
AI-Powered Analysis
Technical Analysis
This threat involves a malware campaign targeting a large Polish organization using a social engineering technique involving fake CAPTCHA prompts. Users are deceived into running malicious code through the Windows+R shortcut, which is an uncommon but effective infection vector. The malware campaign includes two main families: Latrodectus version 2.3 and Supper. Latrodectus is known for its sophisticated persistence mechanisms, including side-loading legitimate DLLs to evade detection, and uses advanced techniques such as process injection (T1055) and credential dumping (T1003). Supper complements Latrodectus by providing additional capabilities such as ransomware-like encryption of company data. Both malware families communicate with command and control (C2) servers using encrypted protocols (T1071.001) to receive commands and exfiltrate data. The campaign employs obfuscation (T1027) and masquerading (T1036.004) to avoid signature-based detection. Persistence is maintained through scheduled tasks (T1053.005) and registry modifications. The report includes technical indicators like C2 IP addresses and file hashes, which can be used for detection and response. The attack chain demonstrates a blend of social engineering, malware sophistication, and stealthy communication, making it a complex threat to detect and mitigate. The absence of known public exploits suggests this is a targeted campaign rather than widespread opportunistic malware. The report emphasizes the importance of employee training to recognize social engineering attempts and the need for continuous monitoring of unusual system and network activities to detect early signs of compromise.
Potential Impact
If successful, this malware campaign can lead to significant operational disruption through encryption of critical company data, effectively amounting to a ransomware attack. The compromise of credentials and persistent access allows attackers to move laterally within the network, increasing the risk of data exfiltration and further sabotage. Organizations may face downtime, loss of sensitive information, reputational damage, and financial costs related to incident response and recovery. The use of sophisticated evasion techniques complicates detection and remediation, potentially prolonging the attack lifecycle. Given the targeted nature and the use of social engineering, organizations with large user bases and complex IT environments are particularly at risk. The impact extends beyond confidentiality to integrity and availability of systems and data, making this a multi-dimensional threat. Failure to detect early signs may result in widespread encryption and operational paralysis. The medium severity rating reflects the balance between the attack complexity and the need for user interaction, but the potential consequences warrant serious attention.
Mitigation Recommendations
To mitigate this threat, organizations should implement a multi-layered defense strategy. First, conduct targeted employee training focused on recognizing social engineering tactics, especially fake CAPTCHA prompts and suspicious use of Windows+R commands. Deploy application whitelisting and restrict execution of unauthorized scripts or binaries launched via shortcut keys. Enhance endpoint detection and response (EDR) capabilities to identify behaviors such as side-loading, process injection, and unusual scheduled tasks. Network monitoring should include anomaly detection for encrypted C2 communications and unusual outbound connections to known malicious IP addresses. Regularly update and patch systems to reduce the attack surface, even though no specific patches are noted for this malware. Implement strict credential management policies and monitor for signs of credential dumping. Use threat intelligence feeds to incorporate the provided indicators of compromise into security tools for proactive detection. Conduct regular backups with offline storage to enable recovery from ransomware-like encryption. Finally, establish incident response plans that include rapid isolation and forensic analysis to contain infections early.
Technical Details
- Author
- AlienVault
- Tlp
- white
- References
- ["https://cert.pl/posts/2026/02/fake-captcha-in-action"]
- Adversary
- null
- Pulse Id
- 69972ba4edeee60b22933086
- Threat Score
- null
Indicators of Compromise
Hash
| Value | Description | Copy |
|---|---|---|
hash16afa928cd820a572bd47e798f481c46 | — | |
hashe6133838440afc64ce9722343a1cb297 | — | |
hashee901ff4ad552d0f8dc8fd5837ace5ab | — | |
hashfd817202314d4067c2dc9c51d98f0268 | — | |
hash273962821f14982ead6c10823587fd39e89cf2fc | — | |
hash699cf845d7320c0a7c1407dbf8f73c9fdfb5c754 | — | |
hashb5710067c36447759b82593200f7374760d71571 | — | |
hashd1eccb3d907f0cd7e52d502b340624d5dc98f8dc | — | |
hash21b953dc06933a69bcb2e0ea2839b47288fc8f577e183c95a13fc3905061b4e6 | — | |
hash2528df60e55f210a6396dd7740d76afe30d5e9e8684a5b8a02a63bdcb5041bfc | — | |
hash6673794376681c48ce4981b42e9293eee010d60ef6b100a3866c0abd571ea648 | — | |
hashaf45a728552ccfdcd9435c40ace60a9354d7c1b52abf507a2f1cb371dada4fde | — | |
hashb7f8750851e70ec755343d322d7d81ea0fc1b12d4a1ab6a60e7c8605df4cd6a5 | — | |
hashbe5bcdfc0dbe204001b071e8270bd6856ce6841c43338d8db914e045147b0e77 | — | |
hash3d56542349180e144aa17230e99b7eb4a29b97ea | — |
Ip
| Value | Description | Copy |
|---|---|---|
ip110.199.19.162 | — | |
ip171.130.169.141 | — | |
ip185.233.166.27 | — | |
ip27.166.233.185 | — | |
ip85.239.54.130 | — |
Url
| Value | Description | Copy |
|---|---|---|
urlhttp://jzluw.com/cdn-dynmedia-1.microsoft.com/is/n03ufh3k003jdhkg99fhhas/is/content/ | — | |
urlhttp://naintn.com/amazoncdn.com/oeiich37874cj30dkk43885j10vj38h38jd/nrs/opn/ca/ | — | |
urlhttps://fadoklismokley.com/work/ | — | |
urlhttps://fadoklismokley.com/work/?counter=0&type=1&guid=3B7FFFF7F331576B6FA3479BDF43&os=6&arch=1&username=JohnDoe&group=2201209746&ver=2.3&up=7&direction=fadoklismokley.com | — | |
urlhttps://gasrobariokley.com/work/ | — | |
urlhttps://gasrobariokley.com/work/?counter=0&type=1&guid=3B7FFFF7F331576B6FA3479BDF43&os=6&arch=1&username=JohnDoe&group=2201209746&ver=2.3&up=7&direction=gasrobariokley.com | — |
Domain
| Value | Description | Copy |
|---|---|---|
domainfadoklismokley.com | — | |
domaingasrobariokley.com | — | |
domainjzluw.com | — | |
domainnaintn.com | — |
Threat ID: 69974fe8d7880ec89b065be4
Added to database: 2/19/2026, 6:01:12 PM
Last enriched: 2/19/2026, 6:16:54 PM
Last updated: 2/19/2026, 8:52:08 PM
Views: 3
Community Reviews
0 reviewsCrowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.
Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.
Related Threats
Uncovering Malicious Cryptocurrency Scam Domains and Hacked YouTube Channels
MediumFake Homebrew Pages Deliver Cuckoo Stealer via ClickFix | macOS Threat Hunting Analysis
MediumThe Curious Case of the Triton Malware Fork
MediumMaltrail IOC for 2026-02-19
MediumMaltrail IOC for 2026-02-18
MediumActions
Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.
External Links
Need more coverage?
Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.
For incident response and remediation, OffSeq services can help resolve threats faster.